Trouble binding clients

Hi There,
I've had to erase and install our server and now that everything is set up, I can't get any clients connected – I see:
"The version of the server you are trying to connect to is not supported. Please contact your system administrator to resolve the problem."
The frustrating thing is that all the clients (4x 10.8 and 1x 10.7) were all able to connect previously so I'm not sure the above version error is correct.
I'm currently focusing on one 10.8 client and I've tried cleaning out the local KDC with:
– sudo security delete-certificates -c "com.apple.kerberos.kdc" /Library/Keychains/System.keychain
– sudo dscl . -delete /Config/KerberosKDC
– sudo rm /var/db/.configureLocalKDC
– sudo rm -R /var/db/krb5kdc
– sudo /usr/libexec/configureLocalKDC
I've then tried binding manually via Open Directory Utility and restarted. I see a green circle beside the server's IP address under Login options so I think everything is setup.
This server is only running OD, AFP and DNS – nothing else.
It's been a while since I've had to set up this server (3 years) so I'm not sure what I've missed sorry.
Any help or pointers in the right direction would be much appreciated – I'm a designer so go easy on me!
Cheers
Ben

Actually, I'm pretty sure I found all this binding confusing (and unesasary with 5 clients) is there a way to let people just login?
After checking the other 10.7 client, I'm not seeing any LDAP servers configured.

Similar Messages

  • Finder crashes on binded client machines

    Having upgraded my mac mini server to Yosemite 10.10.1 and server to V4, I upgraded my iMac and laptop to the same OS. My server user accounts work perfectly if I login on the server machine, however the two binded client machines are not working well. I have checked the directory settings and tried rebinding the machines; however the problem is unresolved.
    The issue is that the finder crashes when I login in as a network user. The local admin account is fine. Exactly the same thing happens on two different machines when using a network login.
    I have tried resetting PRAM, repairing permissions, checked that my DNS resolves correctly and still the problem exists.
    Many thanks in advance for any help you may have.

    Unfortunately not as the network accounts do not work on the server or client machines. I have come up with a work around which works perfectly for me.
    After many days of pulling my hair out I have come up with a new way of running the server which works a treat. Instead of creating network user accounts, I have created local accounts on all of my Macs with the same user names and password for each person. I can then get the client machines to see the home folder on the server for each account. This means that all docs are now on the server machine and we can access them from any computer. This also works for iPhoto and iTunes as I can point the app to look at the library on the server machine for each user.
    What this means is that all other apps are dealt with locally i.e.. mail, address book etc. As I have set these up using google apps, when you update one computer all the other computers will update on login. If you use iCloud keychain this all gets updated automatically!
    The only thing that is not consistent on all machines is the dock and desktop images. I can cope with that to be honest! A very small price to pay to see the system finally working properly.

  • Cannot Bind Clients to Newly Configured Mac Server (10.8)

    I have downloaded, installed and configured Server 10.8 on my iMac, and am having difficulty binding clients (all OS X 10.8) to it. Everything seems to be configured corecttly in the Server app, and the clients are able to find it no problem. But it crashes the client side when I try to bind them to the server. I looked in the sysem log file on the server, and there is a whole mess of error messageas appearing, with a sampling here:
    Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd
    These errors repeat over and over in the log, and may or may not impact what I am trying to do.
    When trying to bind the client, I get a whole bunch of error, to many to include here. (wish I could upload the text file). Would someone be willing to take a look at the full listing and help me troubleshoot it? It would be MUCH appreciated!

    Thanks Jaime, I went ahead and turned on debug logging and tried again to join my client to the OD. The two screenshots show what I saw on the client side, and the text below contains the log entries associated with this attempt.
    Oct 23 07:08:56 server.sheavernet.private mdworker[34841]: Unable to talk to lsboxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34842]): mdworker(34842) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server.sheavernet.private sandboxd[34843] ([34841]): mdworker(34841) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:08:56 server kernel[0]: Sandbox: sandboxd(34843) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Starting automatic backup
    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 07:11:27 server.sheavernet.private com.apple.backupd[34898]: Backup failed with error: 19
    Oct 23 07:11:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 07:11:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 07:12:32 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd1-192.168.1.3:0!
    Oct 23 07:12:56 server.sheavernet.private mdworker[34921]: Unable to talk to lsboxd
    Oct 23 07:12:56 server.sheavernet.private mdworker[34919]: Unable to talk to lsboxd
    Oct 23 07:12:56 server.sheavernet.private mdworker[34920]: Unable to talk to lsboxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34921]): mdworker(34921) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34919]): mdworker(34919) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server.sheavernet.private sandboxd[34923] ([34920]): mdworker(34920) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:12:57 server kernel[0]: Sandbox: sandboxd(34923) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:13:50 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd2-192.168.1.3:0!
    Oct 23 07:14:57 server.sheavernet.private mdworker[34957]: Unable to talk to lsboxd
    Oct 23 07:14:57 server.sheavernet.private sandboxd[34959] ([34957]): mdworker(34957) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:14:57 server kernel[0]: Sandbox: sandboxd(34959) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35025]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35024]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private mdworker[35023]: Unable to talk to lsboxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35025]): mdworker(35025) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35024]): mdworker(35024) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server.sheavernet.private sandboxd[35027] ([35023]): mdworker(35023) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:18:58 server kernel[0]: Sandbox: sandboxd(35027) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35099]: Unable to talk to lsboxd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35100]: Unable to talk to lsboxd
    Oct 23 07:22:59 server.sheavernet.private mdworker[35101]: Unable to talk to lsboxd
    Oct 23 07:22:59 server kernel[0]: Sandbox: sandboxd(35103) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35099]): mdworker(35099) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35100]): mdworker(35100) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:22:59 server.sheavernet.private sandboxd[35103] ([35101]): mdworker(35101) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:23:31 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd3-192.168.1.3:0!
    Oct 23 07:25:00 server.sheavernet.private mdworker[35145]: Unable to talk to lsboxd
    Oct 23 07:25:00 server.sheavernet.private sandboxd[35147] ([35145]): mdworker(35145) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:25:00 server kernel[0]: Sandbox: sandboxd(35147) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:27:00 server.sheavernet.private mdworker[35180]: Unable to talk to lsboxd
    Oct 23 07:27:00 server.sheavernet.private mdworker[35179]: Unable to talk to lsboxd
    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35180]): mdworker(35180) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:27:00 server.sheavernet.private sandboxd[35181] ([35179]): mdworker(35179) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:27:01 server kernel[0]: Sandbox: sandboxd(35181) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:30:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd5-192.168.1.3:0!
    Oct 23 07:31:01 server.sheavernet.private mdworker[35247]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private mdworker[35248]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private mdworker[35249]: Unable to talk to lsboxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35247]): mdworker(35247) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35248]): mdworker(35248) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server.sheavernet.private sandboxd[35261] ([35249]): mdworker(35249) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:31:01 server kernel[0]: Sandbox: sandboxd(35261) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:33:02 server.sheavernet.private mdworker[35295]: Unable to talk to lsboxd
    Oct 23 07:33:02 server.sheavernet.private sandboxd[35297] ([35295]): mdworker(35295) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:33:02 server kernel[0]: Sandbox: sandboxd(35297) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35361]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35359]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private mdworker[35360]: Unable to talk to lsboxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35361]): mdworker(35361) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35359]): mdworker(35359) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server.sheavernet.private sandboxd[35363] ([35360]): mdworker(35360) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:37:03 server kernel[0]: Sandbox: sandboxd(35363) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35427]: Unable to talk to lsboxd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35429]: Unable to talk to lsboxd
    Oct 23 07:41:04 server.sheavernet.private mdworker[35428]: Unable to talk to lsboxd
    Oct 23 07:41:04 server kernel[0]: Sandbox: sandboxd(35441) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35427]): mdworker(35427) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35429]): mdworker(35429) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:41:04 server.sheavernet.private sandboxd[35441] ([35428]): mdworker(35428) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:42:11 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xd6-192.168.1.3:0!
    Oct 23 07:43:04 server.sheavernet.private mdworker[35467]: Unable to talk to lsboxd
    Oct 23 07:43:05 server.sheavernet.private sandboxd[35478] ([35467]): mdworker(35467) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:43:05 server kernel[0]: Sandbox: sandboxd(35478) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:45:05 server.sheavernet.private mdworker[35503]: Unable to talk to lsboxd
    Oct 23 07:45:05 server.sheavernet.private mdworker[35502]: Unable to talk to lsboxd
    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35503]): mdworker(35503) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:45:05 server.sheavernet.private sandboxd[35513] ([35502]): mdworker(35502) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:45:06 server kernel[0]: Sandbox: sandboxd(35513) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35577]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35579]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private mdworker[35578]: Unable to talk to lsboxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35577]): mdworker(35577) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35579]): mdworker(35579) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server.sheavernet.private sandboxd[35581] ([35578]): mdworker(35578) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:49:06 server kernel[0]: Sandbox: sandboxd(35581) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:51:07 server.sheavernet.private mdworker[35623]: Unable to talk to lsboxd
    Oct 23 07:51:07 server.sheavernet.private sandboxd[35625] ([35623]): mdworker(35623) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:51:07 server kernel[0]: Sandbox: sandboxd(35625) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:51:24 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xda-192.168.1.3:0!
    Oct 23 07:55:07 server.sheavernet.private mdworker[35689]: Unable to talk to lsboxd
    Oct 23 07:55:07 server.sheavernet.private mdworker[35687]: Unable to talk to lsboxd
    Oct 23 07:55:07 server.sheavernet.private mdworker[35688]: Unable to talk to lsboxd
    Oct 23 07:55:07 server kernel[0]: Sandbox: sandboxd(35691) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35689]): mdworker(35689) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35687]): mdworker(35687) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:55:07 server.sheavernet.private sandboxd[35691] ([35688]): mdworker(35688) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35749]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35747]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private mdworker[35748]: Unable to talk to lsboxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35749]): mdworker(35749) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35747]): mdworker(35747) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:08 server.sheavernet.private sandboxd[35761] ([35748]): mdworker(35748) deny mach-lookup com.apple.ls.boxd
    Oct 23 07:59:09 server kernel[0]: Sandbox: sandboxd(35761) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:00:16 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdb-192.168.1.3:0!
    Oct 23 08:01:09 server.sheavernet.private mdworker[35795]: Unable to talk to lsboxd
    Oct 23 08:01:09 server.sheavernet.private sandboxd[35797] ([35795]): mdworker(35795) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:01:10 server kernel[0]: Sandbox: sandboxd(35797) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:03:10 server.sheavernet.private mdworker[35812]: Unable to talk to lsboxd
    Oct 23 08:03:10 server.sheavernet.private mdworker[35811]: Unable to talk to lsboxd
    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35812]): mdworker(35812) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:03:10 server.sheavernet.private sandboxd[35813] ([35811]): mdworker(35811) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:03:10 server kernel[0]: Sandbox: sandboxd(35813) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35843]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35842]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private mdworker[35841]: Unable to talk to lsboxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35843]): mdworker(35843) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35842]): mdworker(35842) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:10 server.sheavernet.private sandboxd[35845] ([35841]): mdworker(35841) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:07:11 server kernel[0]: Sandbox: sandboxd(35845) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:09:11 server.sheavernet.private mdworker[35861]: Unable to talk to lsboxd
    Oct 23 08:09:11 server.sheavernet.private sandboxd[35863] ([35861]): mdworker(35861) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:09:12 server kernel[0]: Sandbox: sandboxd(35863) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Starting automatic backup
    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 08:11:57 server.sheavernet.private com.apple.backupd[35890]: Backup failed with error: 19
    Oct 23 08:11:57 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 08:11:58 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 08:13:12 server.sheavernet.private mdworker[35900]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private mdworker[35902]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private mdworker[35901]: Unable to talk to lsboxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35900]): mdworker(35900) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35902]): mdworker(35902) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server.sheavernet.private sandboxd[35904] ([35901]): mdworker(35901) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:13:12 server kernel[0]: Sandbox: sandboxd(35904) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35933]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35932]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private mdworker[35934]: Unable to talk to lsboxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35933]): mdworker(35933) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35932]): mdworker(35932) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server.sheavernet.private sandboxd[35936] ([35934]): mdworker(35934) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:17:13 server kernel[0]: Sandbox: sandboxd(35936) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:17:56 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xdd-192.168.1.3:0!
    Oct 23 08:19:14 server.sheavernet.private mdworker[35952]: Unable to talk to lsboxd
    Oct 23 08:19:14 server.sheavernet.private sandboxd[35954] ([35952]): mdworker(35952) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:19:14 server kernel[0]: Sandbox: sandboxd(35954) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:21:14 server.sheavernet.private mdworker[35977]: Unable to talk to lsboxd
    Oct 23 08:21:14 server.sheavernet.private mdworker[35976]: Unable to talk to lsboxd
    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35977]): mdworker(35977) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:21:14 server.sheavernet.private sandboxd[35978] ([35976]): mdworker(35976) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:21:15 server kernel[0]: Sandbox: sandboxd(35978) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36006]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36005]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private mdworker[36007]: Unable to talk to lsboxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36006]): mdworker(36006) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36005]): mdworker(36005) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server.sheavernet.private sandboxd[36009] ([36007]): mdworker(36007) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:25:15 server kernel[0]: Sandbox: sandboxd(36009) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:27:16 server.sheavernet.private mdworker[36025]: Unable to talk to lsboxd
    Oct 23 08:27:16 server kernel[0]: Sandbox: sandboxd(36027) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:27:16 server.sheavernet.private sandboxd[36027] ([36025]): mdworker(36025) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:27:41 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe0-192.168.1.3:0!
    Oct 23 08:30:06 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe1-192.168.1.3:0!
    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 08:31:04 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ [email protected] from 127.0.0.1:59519 for krbtgt/[email protected]
    Oct 23 08:31:04 --- last message repeated 1 time ---
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Client sent patypes: REQ-ENC-PA-REP
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: Need to use PA-ENC-TIMESTAMP/PA-PK-AS-REQ
    Oct 23 08:31:04 server.sheavernet.private kdc[14291]: AS-REQ [email protected] from 127.0.0.1:54377 for krbtgt/[email protected]
    Oct 23 08:31:05 --- last message repeated 1 time ---
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client sent patypes: ENC-TS, REQ-ENC-PA-REP
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: ENC-TS pre-authentication succeeded -- [email protected]
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Client supported enctypes: aes256-cts-hmac-sha1-96, aes128-cts-hmac-sha1-96, des3-cbc-sha1, arcfour-hmac-md5, using aes256-cts-hmac-sha1-96/aes256-cts-hmac-sha1-96
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: Requested flags: forwardable
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ [email protected] from 127.0.0.1:53253 for host/[email protected] [canonicalize]
    Oct 23 08:31:05 server.sheavernet.private kdc[14291]: TGS-REQ [email protected] from 127.0.0.1:52312 for ldap/[email protected] [canonicalize]
    Oct 23 08:31:16 server.sheavernet.private mdworker[36066]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private mdworker[36067]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private mdworker[36068]: Unable to talk to lsboxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36066]): mdworker(36066) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36067]): mdworker(36067) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:16 server.sheavernet.private sandboxd[36070] ([36068]): mdworker(36068) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:31:17 server kernel[0]: Sandbox: sandboxd(36070) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:32:05 server.sheavernet.private servermgrd[36063]: -[AccountsRequestHandler(AccountsSystemConfigurationObservation) registerForKeychainEventNotifications]: SecKeychainAddCallback() status: -25297
    Oct 23 08:35:17 server.sheavernet.private mdworker[36103]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private mdworker[36102]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private mdworker[36104]: Unable to talk to lsboxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36103]): mdworker(36103) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36102]): mdworker(36102) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:17 server.sheavernet.private sandboxd[36106] ([36104]): mdworker(36104) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:35:18 server kernel[0]: Sandbox: sandboxd(36106) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:36:05 server.sheavernet.private servermgrd[36063]: No requests in 300 seconds, shutting down
    Oct 23 08:37:19 server.sheavernet.private mdworker[36122]: Unable to talk to lsboxd
    Oct 23 08:37:19 server.sheavernet.private sandboxd[36124] ([36122]): mdworker(36122) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:37:19 server kernel[0]: Sandbox: sandboxd(36124) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:37:26 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe3-192.168.1.3:0!
    Oct 23 08:39:19 server.sheavernet.private mdworker[36139]: Unable to talk to lsboxd
    Oct 23 08:39:19 server.sheavernet.private mdworker[36138]: Unable to talk to lsboxd
    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36139]): mdworker(36139) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:39:19 server.sheavernet.private sandboxd[36140] ([36138]): mdworker(36138) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:39:19 server kernel[0]: Sandbox: sandboxd(36140) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:40:15 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe4-192.168.1.3:0!
    Oct 23 08:43:20 server.sheavernet.private mdworker[36177]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private mdworker[36176]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private mdworker[36178]: Unable to talk to lsboxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36177]): mdworker(36177) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36176]): mdworker(36176) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server.sheavernet.private sandboxd[36180] ([36178]): mdworker(36178) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:43:20 server kernel[0]: Sandbox: sandboxd(36180) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:45:21 server.sheavernet.private mdworker[36196]: Unable to talk to lsboxd
    Oct 23 08:45:21 server.sheavernet.private sandboxd[36198] ([36196]): mdworker(36196) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:45:21 server kernel[0]: Sandbox: sandboxd(36198) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36226]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36225]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private mdworker[36224]: Unable to talk to lsboxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36226]): mdworker(36226) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36225]): mdworker(36225) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:21 server.sheavernet.private sandboxd[36228] ([36224]): mdworker(36224) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:49:22 server kernel[0]: Sandbox: sandboxd(36228) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36264]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36265]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private mdworker[36266]: Unable to talk to lsboxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36264]): mdworker(36264) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36265]): mdworker(36265) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server.sheavernet.private sandboxd[36268] ([36266]): mdworker(36266) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:53:22 server kernel[0]: Sandbox: sandboxd(36268) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:55:23 server.sheavernet.private mdworker[36284]: Unable to talk to lsboxd
    Oct 23 08:55:23 server kernel[0]: Sandbox: sandboxd(36286) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 08:55:23 server.sheavernet.private sandboxd[36286] ([36284]): mdworker(36284) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server.sheavernet.private mdworker[36300]: Unable to talk to lsboxd
    Oct 23 08:57:24 server.sheavernet.private mdworker[36301]: Unable to talk to lsboxd
    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36300]): mdworker(36300) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server.sheavernet.private sandboxd[36302] ([36301]): mdworker(36301) deny mach-lookup com.apple.ls.boxd
    Oct 23 08:57:24 server kernel[0]: Sandbox: sandboxd(36302) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36337]: Unable to talk to lsboxd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36338]: Unable to talk to lsboxd
    Oct 23 09:01:24 server.sheavernet.private mdworker[36339]: Unable to talk to lsboxd
    Oct 23 09:01:24 server kernel[0]: Sandbox: sandboxd(36341) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36337]): mdworker(36337) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36338]): mdworker(36338) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:01:24 server.sheavernet.private sandboxd[36341] ([36339]): mdworker(36339) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:03:25 server.sheavernet.private mdworker[36357]: Unable to talk to lsboxd
    Oct 23 09:03:25 server.sheavernet.private sandboxd[36359] ([36357]): mdworker(36357) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:03:25 server kernel[0]: Sandbox: sandboxd(36359) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36388]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36386]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private mdworker[36387]: Unable to talk to lsboxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36388]): mdworker(36388) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36386]): mdworker(36386) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server.sheavernet.private sandboxd[36390] ([36387]): mdworker(36387) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:07:26 server kernel[0]: Sandbox: sandboxd(36390) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36428]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36426]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private mdworker[36427]: Unable to talk to lsboxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36428]): mdworker(36428) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36426]): mdworker(36426) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server.sheavernet.private sandboxd[36430] ([36427]): mdworker(36427) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:11:27 server kernel[0]: Sandbox: sandboxd(36430) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Starting automatic backup
    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 09:12:27 server.sheavernet.private com.apple.backupd[36441]: Backup failed with error: 19
    Oct 23 09:12:27 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [15] for authorization created by '/usr/libexec/UserEventAgent' [15] (100012,0)
    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 09:12:28 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 09:13:28 server.sheavernet.private mdworker[36449]: Unable to talk to lsboxd
    Oct 23 09:13:28 server.sheavernet.private sandboxd[36451] ([36449]): mdworker(36449) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:13:29 server kernel[0]: Sandbox: sandboxd(36451) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:15:29 server.sheavernet.private mdworker[36466]: Unable to talk to lsboxd
    Oct 23 09:15:29 server.sheavernet.private mdworker[36465]: Unable to talk to lsboxd
    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36466]): mdworker(36466) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:15:29 server.sheavernet.private sandboxd[36467] ([36465]): mdworker(36465) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:15:29 server kernel[0]: Sandbox: sandboxd(36467) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36496]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36495]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private mdworker[36494]: Unable to talk to lsboxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36496]): mdworker(36496) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36495]): mdworker(36495) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server.sheavernet.private sandboxd[36499] ([36494]): mdworker(36494) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:19:30 server kernel[0]: Sandbox: sandboxd(36499) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:21:40 server.sheavernet.private mdworker[36524]: Unable to talk to lsboxd
    Oct 23 09:21:40 server.sheavernet.private sandboxd[36526] ([36524]): mdworker(36524) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:21:40 server kernel[0]: Sandbox: sandboxd(36526) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36554]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36553]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private mdworker[36552]: Unable to talk to lsboxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36554]): mdworker(36554) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36553]): mdworker(36553) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server.sheavernet.private sandboxd[36556] ([36552]): mdworker(36552) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:25:41 server kernel[0]: Sandbox: sandboxd(36556) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:29:41 server.sheavernet.private mdworker[36584]: Unable to talk to lsboxd
    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36584]): mdworker(36584) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:29:41 server.sheavernet.private mdworker[36586]: Unable to talk to lsboxd
    Oct 23 09:29:41 server.sheavernet.private sandboxd[36585] ([36586]): mdworker(36586) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:29:42 server kernel[0]: Sandbox: sandboxd(36585) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:29:42 server.sheavernet.private mdworker[36587]: Unable to talk to lsboxd
    Oct 23 09:29:42 server.sheavernet.private sandboxd[36585] ([36587]): mdworker(36587) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:31:42 server.sheavernet.private mdworker[36615]: Unable to talk to lsboxd
    Oct 23 09:31:42 server.sheavernet.private sandboxd[36617] ([36615]): mdworker(36615) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:31:43 server kernel[0]: Sandbox: sandboxd(36617) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:33:43 server.sheavernet.private mdworker[36631]: Unable to talk to lsboxd
    Oct 23 09:33:43 server.sheavernet.private mdworker[36632]: Unable to talk to lsboxd
    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36631]): mdworker(36631) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:33:43 server.sheavernet.private sandboxd[36633] ([36632]): mdworker(36632) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:33:43 server kernel[0]: Sandbox: sandboxd(36633) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36663]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36662]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private mdworker[36661]: Unable to talk to lsboxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36663]): mdworker(36663) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36662]): mdworker(36662) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server.sheavernet.private sandboxd[36665] ([36661]): mdworker(36661) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:37:44 server kernel[0]: Sandbox: sandboxd(36665) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:38:45 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe5-192.168.1.3:0!
    Oct 23 09:39:45 server.sheavernet.private mdworker[36681]: Unable to talk to lsboxd
    Oct 23 09:39:45 server.sheavernet.private sandboxd[36683] ([36681]): mdworker(36681) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:39:45 server kernel[0]: Sandbox: sandboxd(36683) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:40:20 server.sheavernet.private com.apple.usbmuxd[16435]: _handle_timer heartbeat detected detach for device 0xe6-192.168.1.3:0!
    Oct 23 09:43:45 server.sheavernet.private mdworker[36718]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private mdworker[36717]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private mdworker[36719]: Unable to talk to lsboxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36718]): mdworker(36718) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36717]): mdworker(36717) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:45 server.sheavernet.private sandboxd[36721] ([36719]): mdworker(36719) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:43:46 server kernel[0]: Sandbox: sandboxd(36721) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36749]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36751]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private mdworker[36750]: Unable to talk to lsboxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36749]): mdworker(36749) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36751]): mdworker(36751) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server.sheavernet.private sandboxd[36753] ([36750]): mdworker(36750) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:47:46 server kernel[0]: Sandbox: sandboxd(36753) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:49:47 server.sheavernet.private mdworker[36770]: Unable to talk to lsboxd
    Oct 23 09:49:47 server.sheavernet.private sandboxd[36772] ([36770]): mdworker(36770) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:49:48 server kernel[0]: Sandbox: sandboxd(36772) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:51:48 server.sheavernet.private mdworker[36795]: Unable to talk to lsboxd
    Oct 23 09:51:48 server.sheavernet.private mdworker[36794]: Unable to talk to lsboxd
    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36795]): mdworker(36795) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:51:48 server.sheavernet.private sandboxd[36796] ([36794]): mdworker(36794) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:51:48 server kernel[0]: Sandbox: sandboxd(36796) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36825]: Unable to talk to lsboxd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36823]: Unable to talk to lsboxd
    Oct 23 09:55:48 server.sheavernet.private mdworker[36824]: Unable to talk to lsboxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36825]): mdworker(36825) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36823]): mdworker(36823) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server.sheavernet.private sandboxd[36827] ([36824]): mdworker(36824) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:55:49 server kernel[0]: Sandbox: sandboxd(36827) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 09:57:49 server.sheavernet.private mdworker[36843]: Unable to talk to lsboxd
    Oct 23 09:57:49 server.sheavernet.private sandboxd[36845] ([36843]): mdworker(36843) deny mach-lookup com.apple.ls.boxd
    Oct 23 09:57:50 server kernel[0]: Sandbox: sandboxd(36845) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36879]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36880]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private mdworker[36881]: Unable to talk to lsboxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36879]): mdworker(36879) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36880]): mdworker(36880) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server.sheavernet.private sandboxd[36883] ([36881]): mdworker(36881) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:01:50 server kernel[0]: Sandbox: sandboxd(36883) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36911]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36912]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private mdworker[36913]: Unable to talk to lsboxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36911]): mdworker(36911) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36912]): mdworker(36912) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server.sheavernet.private sandboxd[36915] ([36913]): mdworker(36913) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:05:51 server kernel[0]: Sandbox: sandboxd(36915) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:07:52 server.sheavernet.private mdworker[36932]: Unable to talk to lsboxd
    Oct 23 10:07:52 server.sheavernet.private sandboxd[36934] ([36932]): mdworker(36932) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:07:52 server kernel[0]: Sandbox: sandboxd(36934) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:09:53 server.sheavernet.private mdworker[36948]: Unable to talk to lsboxd
    Oct 23 10:09:53 server.sheavernet.private mdworker[36949]: Unable to talk to lsboxd
    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36948]): mdworker(36948) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:09:53 server.sheavernet.private sandboxd[36950] ([36949]): mdworker(36949) deny mach-lookup com.apple.ls.boxd
    Oct 23 10:09:53 server kernel[0]: Sandbox: sandboxd(36950) deny mach-lookup com.apple.coresymbolicationd
    Oct 23 10:12:32 server.sheavernet.private WindowServer[16413]: handle_will_sleep_auth_and_shield_windows: no lock state data
    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: User info context values set for serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got user: serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got ruser: (null)
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Got service: authorization
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): No authentication authority returned
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_principal_for_user(): failed: 7
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Done cleanup3
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): Kerberos 5 refuses you
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_check_pwpolicy(): retval: 0
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Establishing credentials
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got user: serveradmin
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Context initialised
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Got euid, egid: 0 0
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done getpwnam()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done setegid() & seteuid()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: krb5 user serveradmin doesn't have a principal
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup3
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done seteuid() & setegid()
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): Done cleanup4
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: ntlm
    Oct 23 10:12:44 server.sheavernet.private authorizationhost[36979]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping
    Oct 23 10:12:44 server.sheavernet.private SecurityAgent[16423]: Login Window login proceeding
    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100003,0)
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Login Window - Returned from Security Agent
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: USER_PROCESS: 16412 console
    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: Could not open job overrides database at: /private/var/db/launchd.db/com.apple.launchd.peruser.503/overrides.plist: 2: No such file or directory
    Oct 23 10:12:44 server.sheavernet.private launchctl[36981]: launchctl: Dubious permissions on file (skipping): /Library/LaunchAgents/com.adobe.AAM.Updater-1.0.plist
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: UserName
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.gamed): Ignored this key: GroupName
    Oct 23 10:12:44 server com.apple.launchd.peruser.503[11657] (com.apple.ReportCrash): Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self
    Oct 23 10:12:44 server.sheavernet.private loginwindow[16412]: Connection with distnoted server was invalidated
    Oct 23 10:12:44 server.sheavernet.private launchproxyls[36985]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:44 --- last message repeated 3 times ---
    Oct 23 10:12:44 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [16412] for authorization created by '/System/Library/CoreServices/loginwindow.app' [16412] (100002,0)
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.
    Oct 23 10:12:45 server.sheavernet.private WindowServer[16413]: Display 0x042801c0: MappedDisplay Unit 0; ColorProfile { 2, "iMac"}; TransferFormula (1.000000, 1.000000, 1.000000)
    Oct 23 10:12:45 server.sheavernet.private blued[60]: kBTXPCUpdateUserPreferences gConsoleUserUID = 503
    Oct 23 10:12:45 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.services.systemconfiguration.network' by client '/usr/libexec/UserEventAgent' [36982] for authorization created by '/usr/libexec/UserEventAgent' [36982] (100000,0)
    Oct 23 10:12:45 --- last message repeated 1 time ---
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: cannot find fw daemon port 1102
    Oct 23 10:12:45 server.sheavernet.private coreservicesd[66]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationLaunch to notificationID=5591
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:46 --- last message repeated 1 time ---
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to write property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Could not repair overrides database: 0x2
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: FAILURE: Failed to open property list at file://localhost/private/var/db/launchd.db/com.apple.launchd.peruser.503/overri des.plist for reading. (The operation couldn\u2019t be completed. No such file or directory)
    Oct 23 10:12:45 server.sheavernet.private UserEventAgent[36982]: com.apple.TMLaunchAgent disabled
    Oct 23 10:12:45 server.sheavernet.private NetworkBrowserAgent[37002]: Starting NetworkBrowserAgent
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.afpstat-qfa[37020]): Job failed to exec(3) for weird reason: 2
    Oct 23 10:12:46 server kernel[0]: CODE SIGNING: cs_invalid_page(0x1000): p=37021[GoogleSoftwareUp] clearing CS_VALID
    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:46 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m
    Oct 23 10:12:46 server.sheavernet.private talagent[36991]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m
    Oct 23 10:12:46 server com.apple.launchd.peruser.503[11657] (com.apple.mrt.uiagent[37009]): Exited with code: 255
    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (2,0)
    Oct 23 10:12:47 server.sheavernet.private com.apple.SecurityServer[19]: Succeeded authorizing right 'system.privilege.admin' by client '/Library/PrivilegedHelperTools/com.apple.serverd' [65] for authorization created by '/Applications/Server.app/Contents/ServerRoot/usr/libexec/ServerEventAgent' [83] (100000,0)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 1 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSDaemonAdministration(PrivateMethods) ticketsAllowUninstallWithError:] KSDaemonAdministration system Keystone will not uninstall with active tickets.
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 1 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KeystoneDaemon logServiceState] GoogleSoftwareUpdate daemon (1.1.0.3659) vending:
                        com.google.Keystone.Daemon.UpdateEngine: 2 connection(s)
                        com.google.Keystone.Daemon.Administration: 0 connection(s)
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateEngine updateProductID:] KSUpdateEngine updating product ID: "com.google.Keystone"
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSCheckAction performAction] KSCheckAction checking 1 ticket(s).
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction starting update check for ticket(s): {(
                        <KSTicket:0x285710
                                  productID=com.google.Keystone
                                  version=1.1.0.3659
                                  xc=<KSPathExistenceChecker:0x285f50 path=/Library/Google/GoogleSoftwareUpdate/GoogleSoftwareUpdate.bundle/>
                                  serverType=Omaha
                                  url=https://tools.google.com/service/update2
                                  creationDate=2012-02-02 00:47:33
                        >
              Using server: <KSOmahaServer:0x2176ef0
                        engine=<KSDaemonUpdateEngine:0x2823e0>
                        params={
                                  EngineVersion = "1.1.0.3659";
                                  ActivesInfo = {
                                            "com.google.Keystone" = {
                                                      LastActivePingDate = 2012-10-21 07:00:01 +0000;
                                                      LastActiveDate = 2012-10-23 14:12:48 +0000;
                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;
                                            "com.google.Chrome" = {
                                                      LastRollCallPingDate = 2012-10-21 07:00:01 +0000;
                                  UserInitiated = 0;
                                  IsSystem = 1;
                                  OmahaOSVersion = "10.8.2_i486";
                                  Identity = KeystoneDaemon;
                                  AllowedSubdomains = (
                                            ".omaha.sandbox.google.com",
                                            ".tools.google.com",
                                            ".www.google.com",
                                            ".corp.google.com"
              >
    Oct 23 10:12:49 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction performAction] KSUpdateCheckAction running KSServerUpdateRequest: <KSOmahaServerUpdateRequest:0x217f260
                        server=<KSOmahaServer:0x2176ef0>
                        url="https://tools.google.com/service/update2"
                        runningFetchers=0
                        tickets=1
                        activeTickets=1
                        rollCallTickets=1
                        body=
                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
                                  <o:gupdate xmlns:o="http://www.google.com/update2/request" protocol="2.0" version="KeystoneDaemon-1.1.0.3659" ismachine="1">
                                      <o:os platform="mac" version="MacOSX" sp="10.8.2_i486"></o:os>
                                      <o:app appid="com.google.Keystone" version="1.1.0.3659" lang="en-us" installage="264" brand="GGLG">
                                          <o:ping r="2" a="2"></o:ping>
                                          <o:updatecheck></o:updatecheck>
                                      </o:app>
                                  </o:gupdate>
              >
    Oct 23 10:12:51 server.sheavernet.private GoogleSoftwareUpdateDaemon[37031]: -[KSUpdateCheckAction(KSServerUpdateRequestDelegate) serverRequest:fetchedWithResponse:] KSUpdateCheckAction received KSServerUpdateResponse: <KSOmahaServerUpdateResponse:0x2076ef0
                        server=<KSOmahaServer:0x2176ef0>
                        url="https://tools.google.com/service/update2"
                        status=200
                        tickets=1
                        activeTickets=1
                        rollCallTickets=1
                        data=
                                  <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
                                  <gupdate xmlns="

  • A standard way to bind client's requests with Principals?

    Hi, I'm wondering if does exist a standard (vendor-independent) way to bind Principal objects associated with a client which wants to execute a method on a RemoteInterface with the Principal(s) defined in the deployment descriptor.
    If not, that's worrying....
    Marco

    Ok, suppose I have got a deployment descriptor in which I defined the security elements. How could I pass a Subject to a container, together with a client (let's say a servlet) so that the container applies the security declared in the deployment descriptor?
    Marco

  • HT200182 Authentication Error when trying to bind client to Open Directory

    I know the diradmin password, and I've even tried resetting the password just in case and still no luck in getting the client to bind to the server. It keeps telling me authentication error - invalid username or password. I'm 100% sure the admin username is diradmin (default) and I'm 100% sure on the password. Caps Lock is not on, I've tried everthing. At this point I'm thinking I found a bug. Any ideas?

    Logs?

  • Bind client device to specific platform

    Is there any method how to force a device to register on mobile server as some specific platform?
    To speak concretely - I have 2 WM5 PDAs on my desk. The first device (Symbol MC70) has XScale CPU, the other has ARMV4 CPU (Acer n300). I used the same installation cab for both devices (the cab for PPC2003 XScale), but each device registers itself to different platform in Oracle Lite Mobile Server (Oracle Lite PPC2003 ARMV4 versus Oracle Lite PPC2003 XScale). So I need to publish each application twice to be available for both devices even though both devices/platforms are fully compatible - this is very uncomfortable for application evolution...
    I would be probably able to change the platform in the mobileadmin.dm$all_devices or something like this, but this would be no system-solution and could maybe cause some problems on client side (the platform is also stored on client device in polite.txt file afaik - "TYPE=WINCE_XScale_CS_OLITE_2003").

    What you are deploying is a Client Settings policy, not the client itself. This is akin to a Group Policy Object being linked to an OU. The machines in the collection which already have the ConfigMgr client will process those policies, but additional non-client
    machines added to the collection will not automatically install the client.
    As Torsten indicated, you can deploy the client to these machines using the manual client push method.  Simply right click on the clients themselves (or the collection) and select Install Client.  If doing it at the collection level, I recommend
    against selecting "Always install the client software" in the wizard as it will force an unnecessary repair of the existing ConfigMgr clients. I would recommend testing this on one machine in the collection in question before attempting to do them in bulk.
    Note that this requires that a Client Push Installation account be configured (Administration > Site Configuration > Sites > Client Installation Settings >  Client Push Installation > Accounts tab) which has admin rights on the clients.
    You *DO NOT need to enabled site-wide client push installation* to be able to use the Install Client method in the console. Enabling this will force the client to attempt installation on ALL systems that ConfigMgr sees.

  • Trouble binding "TAB" key to JTree

    Hi,
    I tried to bind the TAB key (tab only) by doing this:
    jTree.getInputMap().put(KeyStroke.getKeyStroke(KeyEvent.VK_TAB, 0), "tabActionKey");
    jTree.getActionMap().put("tabActionKey", new AbstractAction() {....and it doesn't seem to work. Nothing happens when i hit tab. However, if i add a modifier, such as CTRL, then it works fine, but unfortunately, I need this to work with TAB only.
    So then I figure the tab key was already binded to this component, so i tried to unbind it, but that didn't work.
    So I found some code which lists all the bindings for a components..found here:
    http://javaalmanac.com/egs/javax.swing/ListKeyBinds.html
    and i printed that out before I assigned my keyStroke, and TAB was not listed. I printed it out after I assigned my keyStroke, and tab WAS listed. (however, it still didn't work).
    Anyone have any ideas about what is goin on?
    thanks

    Here's the complete example: removing TAB from the focus traversal and then adding it to the keyboard actions.
    import java.awt.*;
    import java.awt.event.*;
    import java.util.*;
    import javax.swing.*;
    public class Test {
        public static void main(String[] args) {
            JTree tree = new JTree();
            KeyStroke tab = KeyStroke.getKeyStroke("TAB");
            removeKeystroke(tree, KeyboardFocusManager.FORWARD_TRAVERSAL_KEYS, tab);
            Action action = new AbstractAction("example") {
                public void actionPerformed(ActionEvent evt) {
                    System.out.println("example action");
            addAction(tree, JComponent.WHEN_FOCUSED, tab, action);
            JFrame f = new JFrame("");
            f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
            Container cp = f.getContentPane();
            cp.setLayout(new GridLayout(1,2));
            cp.add(tree);
            cp.add(new JTree());
            f.pack();
            f.setLocationRelativeTo(null);
            f.setVisible(true);
        static void removeKeystroke(Component comp, int id, AWTKeyStroke ks) {
            Set keys = comp.getFocusTraversalKeys(id);
            Set alteredKeys = new HashSet(keys);
            alteredKeys.remove(ks);
            comp.setFocusTraversalKeys(id, alteredKeys);
        static void addAction(JComponent comp, int condition, KeyStroke ks, Action action) {
            Object binding = action.getValue(Action.NAME);
            comp.getInputMap(condition).put(ks, binding);
            comp.getActionMap().put(binding, action);
    }

  • Troubles with client certificates in Windows Phone 8.1 WebViews

    Hi,
    I'm having difficulties using a client certificate in Windows Phone 8.1 WebViews.
    My code works fine in my Windows 8.1 App but i get a WebErrorStatus=[CertificateIsInvalid] in WebView.NavigationCompleted in WP.
    I'm using this code to import my certificate :
    await CertificateEnrollmentManager.ImportPfxDataAsync(certificateBase64, certificatePassword, ExportOption.NotExportable, KeyProtectionLevel.NoConsent, InstallOptions.None, "MyClientCertificate");
    I have no problem using this cert in HttpClient with either Windows 8.1 or Windows Phone 8.1.
    I don't understand why it doesn't work with the WebView control only on Windows Phone.

    Tried it with no success.
    But I just found this : https://blogs.msdn.com/b/wsdevsol/archive/2014/07/31/programmatically-create-and-configure-a-client-certificate-for-use-in-your-windows-runtime-based-app.aspx?Redirected=true
    With the note at the bottom: 
    Note: For Windows Phone 8.1, you need to attach the Client Certificate programmatically. For Windows, once you install the Client Certificate to the app container
    store and do not attach the client certificate with the HttpClient request, the HttpClient class will automatically detect that there is a single certificate installed in the app container store and forward it to the server. However in the case of Windows
    Phone 8.1, there is no such “automatic” selection of the certificate and one MUST provide the certificate programmatically.
    Since there seems to be nothing to attach a custom HttpBaseProtocolFilter to a WebView, it doesn't seem possible atm.

  • Trouble binding 10.5 Server to 10.6 Open Directory

    After a recent power outage one of my 10.5 Servers lost its connection to the OD Master. I am unable to get this system to re-bind to an Open Directory Master (10.6 Server). I had to force un-bind the 10.5 machine (via Directory Utility) because it could not contact the OD Master. After force unbinding the 10.5 Server system I checked Open Directory settings in Server Admin and the role was "Standalone Server".
    Steps to reproduce problem:
    1) Change role of 10.5 Server to "Connects to a Directory System" and rebooted the system.
    2) Launch Directory Utility, click add server and enter the FQDN for my OD Master. SSL option is not checked.
    3) Directory Utility tries to communicate with the OD Master for a few moments...displaying "verifying server address", then comes back with the error "there was no response from SERVER. Please check that the address you entered is correct".
    (where SERVER = the FQDN for the OD Master)
    I Checked that DNS was working and that the system (10.5 Server) could resolve the FQDN of the OD Master. When the above steps did not solve the problem I went to the OD Master and (from Workgroup Manager) deleted the previous entry for the 10.5 Server. This had no effect on the problem. Not sure what to try next?

    Hi,
    Welcome to the    Discussions
    10.5 Server and specifically iChat Server has it's own forum
    http://discussions.apple.com/forum.jspa?forumID=1235 (for Export)
    10.6 Server has Forum called Collaboration Services for iChat Server (And a few other bits)
    The Forums are within Categories.
    Technically each is within it's own OS Category but Tiger, Leopard and Snow Leopard are all shown in this "Master Category" here
    The reason I am posting these links is that I don't know enough about the Server version of iChat.
    The chances are that someone in the 10.6 Server > Collaboration Services forum knows how to Export the list from 10.5 Server and input it in to 10.6 Server.
    Hope this helps.
    7:53 PM Monday; July 19, 2010
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"

  • Trouble for Client Logging in

    I've had this happen a couple of times for clients. I could
    be running a sesstion with 16-20 people in it from the same
    company. Out of the group, 1-2 people will get hun on the Adobe
    Connect "Connecting" screen. It is very hit and miss. One day they
    could get in, the next - no luck. This is a big issue for multi day
    classes as you could understand.....anyone have any
    ideas????

    Hi,
    I searched around and only find these parameters on Exchange 2013 Mailbox Role. There are no appsettings in the OWA web.config file on Exchange 2010.
    Based on my knowledge, OWA logs in Exchange will be mentioned in IIS log. The default path is %SystemDrive%\inetpub\logs\LogFiles. We can check the logs about OWA in these IIS logs.
    However, Mailbox Audit Logging feature that allows you to track mailbox owner, delegate, and administrator logons to a mailbox, as well as what actions are taken while the user is logged on. Is this what you need?
    Refer to this article about Understanding Mailbox Audit Logging
    http://technet.microsoft.com/en-us/library/ff459237(v=exchg.141).aspx
    Best Regards.

  • Trouble binding updated properties to view

    Hi Guys, 
    I have the following code which i want to to populate a combobox based upon the selected item of a treeview.
    as depending on what node is chosen will populate the combobox with a different list of report levels.
    the combobox is within a user control and i am trying to bind to a dependency property ReportLevel i have in my MainViewModel. if i set the value of the combobox its fine but i want to be able to update it whenever a user choses a different node on the tree.
    this is my xaml
    <UserControl x:Class="RTHM.ComboboxControl1"
    xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
    xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
    xmlns:mc="http://schemas.openxmlformats.org/markup- compatibility/2006"
    xmlns:d="http://schemas.microsoft.com/expression/blend/2008"
    mc:Ignorable="d"
    xmlns:local ="clr-namespace:RTHM.ViewModels"
    d:DesignHeight="300" d:DesignWidth="300">
    <Grid>
    ItemsSource="{Binding Path=Levels}"
    IsSynchronizedWithCurrentItem="True"
    DisplayMemberPath="Name"
    SelectedItem="{Binding Path=SelectedLevel, Mode=TwoWay}"
    IsEnabled="{Binding IsEnabled}"/>
    my code behind:
    public partial class ComboboxControl1 : UserControl
    public ComboboxControl1()
    InitializeComponent();
    DataContext = new MainViewModel();and in my viewmodelprivate ObservableCollection<ReportLevel> _levels;
    public ObservableCollection<ReportLevel> Levels
    get
    return _levels;
    set
    _levels = value;
    NotifyPropertyChanged("Levels");
    }my MainViewModel inherits from a base class which has INotifyProperty changed and an implementationpublic class ViewModelBase : INotifyPropertyChanged
    public event PropertyChangedEventHandler PropertyChanged;
    protected void NotifyPropertyChanged(string propertyName)
    if (PropertyChanged != null)
    PropertyChanged(this, new PropertyChangedEventArgs(propertyName));
    }any Ideas on how to update the Comboboxs ItemSource dynamically?Thanks in advance

    They are presumably in the same datacontext?
    Hmmmm
    I wonder if you should really have that combo in a separate usercontrol.
    Anyhow.
    You've Bound the treeview to a collection of whatever that is bound to.
    ( You haven't explained a bunch of relevant stuff here mate )
    Call that a collection of trees.
    A tree presumably has a collection of reportlevels in it.
    Vaguely like
    public class tree()
    public observablecollection<reportlevel> reportlevels [get;set;}
    But maybe with some propertychange stuff.
    Bind selecteditem of the treeview to selectedtree in your viewmodel.
    Bind itemssource of the combo to selectedtree.reportlevels.
    Hope that helps.
    Recent Technet articles: Property List Editing;
    Dynamic XAML

  • Tiger client cannot bind to 10.6.8 server

    When attempting to bind a 10.4.11 client to our 10.6.8 Open Directory server, the DirectoryService process on the client crashes and the bind fails. 10.5.x and 10.6.x clients have no trouble binding and every other element of ldap, kerberos, and password server appear to be working normally.
    We're also noticing errors in slapd.log on the server for 10.4 clients that were previously bound, eg...
    "SASL [conn=1637825] Failure: no user in database ed-12377" In these cases, the existing bind appears normal in WGM and the client machine is working as expected.
    I'm not looking for suggestions as much as I'd like to see if anyone else is able to bind an ancient 10.4.11 (PPC) client to a 10.6.8 server. The answer to this question would simplify our troubleshooting path significantly. Of course, if you know exactly what's going on here, I'm all ears!
    Thanks!
    -Lyle
    From system.log on the Tiger/10.4.11 client:
    Jul 12 11:50:44 Ed-13229 launchd: Server 0 in bootstrap 1103 uid 0: "/usr/sbin/DirectoryService"[255]: exited abnormally: Bus error
    Jul 12 11:50:44 Ed-13229 DirectoryService[262]: Launched version 2.1 (v353.6)
    Jul 12 11:50:44 Ed-13229 crashdump[261]: DirectoryService crashed
    Jul 12 11:50:44 Ed-13229 crashdump[261]: crash report written to: /Library/Logs/CrashReporter/DirectoryService.crash.log
    The crash.log from the Tiger/10.4.11 client, edited and limited to just the crashed thread:
    OS Version:     10.4.11 (Build 8S165)
    Report Version: 4
    Command: DirectoryService
    Path:    /usr/sbin/DirectoryService
    Parent:  launchd [1]
    Thread: 1
    Exception:  EXC_BAD_ACCESS (0x0001)
    Codes:      KERN_PROTECTION_FAILURE (0x0002) at 0x00000000
    Thread 1 Crashed:
    0   libSystem.B.dylib                        0x9002e4cc strcasecmp + 84
    1   DirectoryService                         0x00078d70 CLDAPv3Plugin::TryPWSPasswordSet(unsigned long, unsigned long, sLDAPContextData*, tDataBuffer*, char const*) + 372
    2   DirectoryService                         0x0003a778 CLDAPv3Plugin::DoAuthenticationOnRecordType(sDoDirNodeAuthOnRecordType*, char const*) + 3440
    3   DirectoryService                         0x0001563c CLDAPv3Plugin::HandleRequest(void*) + 848
    4   DirectoryService                         0x0001818c CLDAPv3Plugin::ProcessRequest(void*) + 328
    5   DirectoryService                         0x000032d8 CRequestHandler::HandlePluginCall(sComData**) + 880
    6   DirectoryService                         0x00004274 CRequestHandler::HandleRequest(sComData**) + 92
    7   DirectoryService                         0x0000d794 CMessaging::SendInlineMessage(unsigned long) + 196
    8   DirectoryService                         0x0001fed8 dsDoDirNodeAuthOnRecordType + 716
    9   DirectoryService                         0x0007eba0 CLDAPv3Plugin::DoNewServerBind2(sDoPlugInCustomCall*) + 2364
    10  DirectoryService                         0x0007e198 CLDAPv3Plugin::DoNewServerBind(sDoPlugInCustomCall*) + 476
    11  DirectoryService                         0x0007bad0 CLDAPv3Plugin::DoPlugInCustomCall(sDoPlugInCustomCall*) + 1920
    12  DirectoryService                         0x0001566c CLDAPv3Plugin::HandleRequest(void*) + 896
    13  DirectoryService                         0x0001818c CLDAPv3Plugin::ProcessRequest(void*) + 328
    14  DirectoryService                         0x000032d8 CRequestHandler::HandlePluginCall(sComData**) + 880
    15  DirectoryService                         0x00004274 CRequestHandler::HandleRequest(sComData**) + 92
    16  DirectoryService                         0x000428e0 dsmig_do_api_call + 312
    17  DirectoryService                         0x000889d8 _Xapi_call + 276
    18  DirectoryService                         0x00088684 DirectoryServiceMIG_server + 160
    19  DirectoryService                         0x0003cab0 dsmig_demux_notify(mach_msg_header_t*, mach_msg_header_t*) + 480
    20  libSystem.B.dylib                        0x90108aec mach_msg_server + 520
    21  DirectoryService                         0x0003cdb4 CMigHandlerThread::ThreadMain() + 348
    22  ...ectoryServiceCore.Framework           0x971ff5f4 DSCThread::Run() + 52
    23  ...ectoryServiceCore.Framework           0x971ff348 DSLThread::_RunWrapper(void*) + 96
    24  libSystem.B.dylib                        0x9002b908 _pthread_body + 96

    Hi mcraig55,
    Thanks for the response and suggestion!
    I did review the security settings back when this started. After an OD rebuild (export, demote, promote, import) a few months ago, our standard security settings had not been restored. I tried to bind the 10.4 client with clear text allowed on both sides (server and client). Then, re-enabled the disabling of clear text passwords (what it should have been) and tried again with both sides set the same. In all cases I still get an error:
    Unexpected error while binding - operation cancelled.
    I also used this kb article (http://support.apple.com/kb/TA25124) to try SSL to see if the behavior would be different - no change.
    Interestingly, the directory does show the client in the computer list. However, the Directory Access application doesn't "know" it's bound. Even more bizarre, the client is taking the preferences that were set for the workstation by Open Directory (eg. the message we display at the login window).
    So, at this point, it seems to be 'working.' My speculation is that Directory Service crashes on the client before it can tell the Directory Access application that the client is bound.
    Funky stuff.
    Thanks!

  • Client socket binding to the same local/remote addresses

    Hi all,
    My Java program binds client socket to local address, local port, remote address and remote port. after that from different thread the program creates new socket and bind it to the same address as the first one. The question is: is there possibility that the second socket will be copy as the first one (with the same input/output streams) so that two threads in fact use the same TCP connection.
    (Operating system is HP).
    Thank you,
    Kate

    I have no need to store streams, my problem that each connection has it's own messages numbers(the application implements some protocol over TCP). so if a message number 1 was sent by some connection, and when different thread wants to send a message to the same remote host, it tries to pick up existing connection, but because of a bug creates the new one, which sends the message with number 1 also. And I see that there are situation whent the first thread receives response to the message number 1 althougth it was response to the message number 1 that the second thread has sent. So my question is if there is any possibility of this absurd situation?

  • Lion client OD bind to Lion server - Authentication Failed

    Authenticated bind enabed via terminal command. Client and server are up to date. I've been able to bind Leopard, Snow Leopard, and Lion clients over the last few weeks before this MacBook Air but for some reason it keeps failing with an authentication error. I can log into WGM on the server using my Diradmin account without issue. This is the same account I'm attempting to bind with. I have a non-admin account that can bind clients and it too is failing on the client side. I've been Googling for hours and haven't identified a source or solution. Anyone have any thoughts? I'm just shy of demoting my OD master, promoting it, and re-importing my OD config. I don't want to though.

    Hello michaelhoch,
    could you find any solution?
    I have the same setup: OS X Leopard Server 10.5.8, and Snow Leopard Clients. Everything worked fine. But now I get the first OS X Lion Client, and I can not use Mail, iChat, iCal and so on. I found the same errormessage in Console, and I think I also have a problem with the user directories on the server.
    Tanhks
    Michael

  • SSL Client Binding Error (does not support directory connections encryp....

    So I'm getting the dreaded "does not support directory connections encrypted with ssl" error when attempting to bind clients (10.5) to the server (10.5).
    I followed the Apple KB article, but it did not help...double-checked permissions and the config files.
    Binding works fine w/o SSL...but evidently SSL does not.
    Any news on this?
    Thanks.
    j

    Hmmm...still running into the same issue...do I need to give the cert reference text file certain permissions in order to work?
    I have followed the advice on afp548, and have a self-rolled CA with a self-assigned cert for the server, which is also the dns name of the server. I copied the CA hash and pointed to that instead of the self-signed cert hash, but still...no dice.
    -j

Maybe you are looking for